Security Group

The Security Groups page in the MicroZAccess Web Dashboard presents a table that includes the following information about the created security groups:

  1. NAME: This column displays the name of each security group.

  2. PROTOCOL: The protocol used by the security group is shown in this column.

  3. DESTINATION PORT: This column indicates the port used by the security group.

  4. SOURCE TYPE: The source type of the security group is displayed here.

  5. HOST: The host associated with the security group is shown in this column.

  6. GROUPS: This column lists the group memberships included in the security group.

  7. SUBNET: The CIDR (Classless Inter-Domain Routing) of the security group is provided in this column.

  8. Actions: In this column, you have the option to delete the security group.

Additionally, you can find a search bar located at the top left of the table. This search bar allows you to search for specific keywords or criteria within the table.

Furthermore, towards the top right of the table, you will find the download option. This feature allows you to download the data from the table in a downloadable format. This allows you to save and use the user data offline or for further analysis and reporting.

To the bottom right of the table in the "Users" menu page, you will find the "Add" button. Clicking on this button will open a creation form to add new security groups. The creation form allows you to define the properties and settings for the new security group.

When adding a new security group in the MicroZAccess Web Dashboard, you will be presented with the following fields to fill:

  1. Service: This field allows you to select the type of protocol for the security group.

  2. Protocol: Specify the incoming traffic protocol for the security group.

  3. Destination Ports: Define the destination port or port range for matching the incoming traffic (if the relevant protocol is specified).

  4. Source: Choose the source from where the traffic will originate. You have the following options if you choose custom:

    • Host: Select an existing MZA Endpoint Profile as the source.

    • Subnet: Specify a CIDR that will be allowed access as the source.

    • Groups: Select a list of mandatory Group Memberships for the Endpoints that require access permission.

  5. Name: Provide a name for the security group being created.

  6. Description: This is an optional field where you can add a description to provide additional information about the security group.

By filling in these fields, you can define the properties and settings for the new security group, specifying the protocol, destination ports, source, name, and description.

In addition to the MZA Overlay Servers option in the left navigation panel, there is also a navigation bar in the security groups which gives the option to switch between the Security Groups page and MZA Overlay Servers page.

Last updated